ExamGecko
Ask Question

Salesforce Certified MuleSoft Developer II Practice Test - Questions Answers, Page 2

List of questions

Question 11

Report
Export
Collapse

Mule application A is deployed to CloudHub and is using Object Store v2. Mute application B is also deployed to CloudHub.

Which approach can Mule application B use to remove values from Mule application A'S Object Store?

Object Store v2 REST API
Object Store v2 REST API
CloudHub Connector
CloudHub Connector
Object Store Connector
Object Store Connector
CloudHub REST API
CloudHub REST API
Suggested answer: A

Explanation:

To remove values from Mule application A's Object Store v2, Mule application B can use Object Store v2 REST API. This API allows performing operations on Object Store v2 resources using HTTP methods, such as GET, POST, PUT, and DELETE. Mule application B can use the DELETE method to remove values from Mule application A's Object Store v2 by specifying the object store ID and the key of the value to delete.

Reference: https://docs.mulesoft.com/object-store/osv2-apis

asked 23/09/2024
Robert Calderon
36 questions

Question 12

Report
Export
Collapse

Refer to the exhibit.

Salesforce Certified MuleSoft Developer II image Question 12 65969 09232024002859000000

A Mule application pom.xml configures the Maven Resources plugin to exclude parsing binary files in the project's src/main/resources/certs directory.

Which configuration of this plugin achieves a successful build?

A)

Salesforce Certified MuleSoft Developer II image Question 12 65969 09232024002859000000

B)

Salesforce Certified MuleSoft Developer II image Question 12 65969 09232024002859000000

C)

Salesforce Certified MuleSoft Developer II image Question 12 65969 09232024002859000000

D)

Salesforce Certified MuleSoft Developer II image Question 12 65969 09232024002859000000

Option A
Option A
Option B
Option B
Option C
Option C
Option D
Option D
Suggested answer: C

Explanation:

To configure the Maven Resources plugin to exclude parsing binary files in the project's src/main/resources/certs directory, option C should be used. This option specifies that any files with .cer or .jks extensions under the certs directory should be excluded from filtering. Filtering is a process of replacing placeholders with actual values in resource files during the build process. Binary files should not be filtered because they may become corrupted or unusable.

Reference: https://maven.apache.org/plugins/maven-resources-plugin/examples/filter.html https://maven.apache.org/plugins/maven-resources-plugin/examples/include-exclude.html

asked 23/09/2024
Dylan Johnson
42 questions

Question 13

Report
Export
Collapse

The flow is invoicing a target API. The API's protocol is HTTPS. The TLS configuration in the HTTP Request Configuration global element is set to None. A web client submits a request to http:localhost:8081/vehicles.

Salesforce Certified MuleSoft Developer II image Question 13 65970 09232024002859000000

If the certificate of the target API is signed by a certificate authority (CA), what is true about the HTTP Request operation when the flow executes?

The HTTP Request operation will succeed if the CA'S certificate is present in the JRE's default keystore
The HTTP Request operation will succeed if the CA'S certificate is present in the JRE's default keystore
The HTTP Request operation will succeed if the CA's certificate is present in the JRE's default truststore.
The HTTP Request operation will succeed if the CA's certificate is present in the JRE's default truststore.
The HTTP Request operation will always succeed regardless of the CA
The HTTP Request operation will always succeed regardless of the CA
The HTTP Request operation will always fail regardless of the CA
The HTTP Request operation will always fail regardless of the CA
Suggested answer: B

Explanation:

The HTTP Request operation will use the default truststore of the JRE to validate the certificate of the target API. If the CA's certificate is present in the truststore, the operation will succeed. Otherwise, it will fail with a handshake exception.

Reference: https://docs.mulesoft.com/mule-runtime/4.3/tls-configuration#tls-default

asked 23/09/2024
Hamza BOULHEND
33 questions

Question 14

Report
Export
Collapse

When a client and server are exchanging messages during the mTLS handshake, what is being agreed on during the cipher suite exchange?

A protocol
A protocol
The TLS version
The TLS version
An encryption algorithm
An encryption algorithm
The Public key format
The Public key format
Suggested answer: C

Explanation:

A cipher suite is a set of cryptographic algorithms that are used to secure the communication between a client and a server. A cipher suite consists of four components: a key exchange algorithm, an authentication algorithm, an encryption algorithm, and a message authentication code (MAC) algorithm. During the cipher suite exchange, the client and the server agree on which encryption algorithm to use for encrypting and decrypting the data.

Reference: https://docs.mulesoft.com/mule-runtime/4.3/tls-configuration#cipher-suites

asked 23/09/2024
Tiro malope
40 questions

Question 15

Report
Export
Collapse

A custom policy needs to be developed to intercept all cutbound HTTP requests made by Mule applications.

Which XML element must be used to intercept outbound HTTP requests?

It is not possible to intercept outgoing HTTP requests, only inbound requests
It is not possible to intercept outgoing HTTP requests, only inbound requests
http-policy:source
http-policy:source
htt-policy:operation
htt-policy:operation
http-policy:processor
http-policy:processor
Suggested answer: B

Explanation:

The http-policy:processor element is used to intercept outbound HTTP requests made by Mule applications. It allows customizing the request before it is sent to the target API and modifying the response after it is received from the target API.

Reference: https://docs.mulesoft.com/api-manager/2.x/policy-mule4-custom-policy#policy-xml-file

asked 23/09/2024
Phanel Xavier
46 questions

Question 16

Report
Export
Collapse

An API has been built to enable scheduling email provider. The front-end system does very little data entry validation, and problems have started to appear in the email that go to patients. A validate-customer'' flow is added validate the data.

What is he expected behavior of the 'validate-customer'' flow?

Salesforce Certified MuleSoft Developer II image Question 16 65973 09232024002859000000

If only the email address Is invalid a VALIDATION.INVALID_EMAIL error is raised
If only the email address Is invalid a VALIDATION.INVALID_EMAIL error is raised
If the email address is invalid, processing continues to see if the appointment data and customer name are also invalid
If the email address is invalid, processing continues to see if the appointment data and customer name are also invalid
If the appointment date and customer name are invalid, a SCHEDULE:INVALID_APPOINTMENT_DATE error is raised
If the appointment date and customer name are invalid, a SCHEDULE:INVALID_APPOINTMENT_DATE error is raised
If all of the values are invalid the last validation error is raised:SCHEDULE:INVALID_CUSTOMER_NAME
If all of the values are invalid the last validation error is raised:SCHEDULE:INVALID_CUSTOMER_NAME
Suggested answer: A

Explanation:

The validate-customer flow uses an until-successful scope to validate each field of the customer data. The until-successful scope executes its processors until they succeed or exhausts the maximum number of retries. If any processor fails, it raises an error and stops executing the remaining processors. Therefore, if only the email address is invalid, a VALIDATION.INVALID_EMAIL error is raised and the validation of appointment date and customer name is skipped.

Reference: https://docs.mulesoft.com/mule-runtime/4.3/until-successful-scope

asked 23/09/2024
henri victor BOGMIS
38 questions

Question 17

Report
Export
Collapse

When implementing a synchronous API where the event source is an HTTP Listener, a developer needs to return the same correlation ID back to the caller in the HTTP response header.

How can this be achieved?

Enable the auto-generate CorrelationID option when scaffolding the flow
Enable the auto-generate CorrelationID option when scaffolding the flow
Enable the CorrelationID checkbox in the HTTP Listener configuration
Enable the CorrelationID checkbox in the HTTP Listener configuration
Configure a custom correlation policy
Configure a custom correlation policy
NO action is needed as the correlation ID is returned to the caller in the response header by default
NO action is needed as the correlation ID is returned to the caller in the response header by default
Suggested answer: D

Explanation:

When implementing a synchronous API where the event source is an HTTP Listener, Mule automatically propagates some message attributes between flows via outbound and inbound properties. One of these attributes is correlation ID, which is returned to the caller in the response header by default as MULE_CORRELATION_ID.

Reference: https://docs.mulesoft.com/mule-runtime/4.3/about-mule-message#message-attributes

asked 23/09/2024
Sandor Alayon
27 questions

Question 18

Report
Export
Collapse

Which statement is true about using mutual TLS to secure an application?

Mutual TLS requires a hardware security module to be used
Mutual TLS requires a hardware security module to be used
Mutual TLS authenticates the identity of the server before the identity of the client
Mutual TLS authenticates the identity of the server before the identity of the client
Mutual TLS ensures only authorized end users are allowed to access an endpoint
Mutual TLS ensures only authorized end users are allowed to access an endpoint
Mutual TLS increases the encryption strength versus server-side TLS alone
Mutual TLS increases the encryption strength versus server-side TLS alone
Suggested answer: B

Explanation:

Mutual TLS (mTLS) is an extension of TLS that requires both parties (client and server) to present their certificates to each other during the handshake process. This way, both parties can verify each other's identity and establish a secure connection. The authentication of the server happens before the authentication of the client, as the server sends its certificate first and then requests the client's certificate.

Reference: https://docs.mulesoft.com/mule-runtime/4.3/tls-configuration#mutual-authentication

asked 23/09/2024
Dylan Brons
35 questions

Question 19

Report
Export
Collapse

Which statement is true when using XML SDK for creating custom message processors?

Properties are fields defined by an end user of the XML SDK component and serve as a global configuration for the entire Mule project in which they are used
Properties are fields defined by an end user of the XML SDK component and serve as a global configuration for the entire Mule project in which they are used
An XML SDK provides both inbound and outbound operations
An XML SDK provides both inbound and outbound operations
Operations can be reused in recursive calls
Operations can be reused in recursive calls
All operations are public
All operations are public
Suggested answer: A

Explanation:

When using XML SDK for creating custom message processors, all operations are public by default and can be used by any Mule application that imports them. There is no way to make an operation private or protected in XML SDK.

Reference: https://docs.mulesoft.com/mule-sdk/1.1/xml-sdk#operations

asked 23/09/2024
Gerhard Seher
28 questions

Question 20

Report
Export
Collapse

Which type of cache invalidation does the Cache scope support without having to write any additional code?

Write-through invalidation
Write-through invalidation
White-behind invalidation
White-behind invalidation
Time to live
Time to live
Notification-based invalidation
Notification-based invalidation
Suggested answer: C

Explanation:

The Cache scope supports time to live (TTL) as a cache invalidation strategy without having to write any additional code. TTL specifies how long the cached response is valid before it expires and needs to be refreshed. The Cache scope also supports custom invalidation strategies using MEL or DataWeave expressions.

Reference: https://docs.mulesoft.com/mule-runtime/4.3/cache-scope#cache_invalidation

asked 23/09/2024
Mellisa Stroman
38 questions
Total 60 questions
Go to page: of 6
Search

Related questions